NEWS
ABOUT EVA GROUP
+ 200
Experts & Consultants
+ 350
Certifications
+ 21M€
Turnover (2019 forecast: €28M turnover)
8
Offices globally
OUR PRACTICES
Business Networks
- SDWAN and SDN
- LAN and WAN networks
Collaboration
- Collaborative solutions
- Contact centers
- Unified Comm.
Mobility
- WLAN
- Public/private WiFi
- 4G/5G networks
Data Center
- Virtualization
- Storage
- Hyperconvergence
Compliance and Privacy
- PCI-DSS
- ISO27k
- LPM
- GDPR
- NIS Directive
- Health hosting (HDS)
Security of Cloud and architectures
- Security architecture
- Maintenance in security conditions
- Security incident management (SOC, CSIRT)
- Identity & access management
Vulnerability management
- Intrusive audit/intrusion test
- Configuration review
- Application code review
- Phishing campaign
- Cyber security diagnosis
- Red team
Cyber defence
- SOC Service
- Monitoring of exposed interfaces
- Threat watch
Cloud infra architecture
- Interconnection between regions
- China specificities
Architecture
- Lift & Shift
- Modernization
- Cloud-native
Cloud security
- Cloud secure architecture
- Data security
DevOps
- Automation framework
- CI / CD
- Pivotal platforming
Mapping
- Data catalog
- Characterization
- Conformity
Exploration
- Graph engineering
- Robotic Process Automation
- Machine Learning & AI
Industrialization
- Cloud architecture adapted to the data
- Flow automation
- Data Engineering
AROUND 4 KEY EXPERTISES
IT Strategy
- IT master plan
- Cyber security strategy
- Market studies and benchmarks
- Roadmaps and business cases
- RFI, RFP, RFQ
- Development of processes and management tools
Audit
- Organizational audit, IT governance according to market standards (ITIL, ISO 27k, DEVOPS)
- Technical audit (application performance audit / WiFi)
- Intrusive audit / intrusion test
Architecture
- IS Analysis
- IS Mapping
- Choice of technologies
- Migration strategy
Operational maintenance
- Structural reviews
- Troubleshooting
- Application performance diagnostics
- Application performance predictions
N2-N3 support
- Incident management
- Problem management
Custom integration
- Design / architecture (HLD, LLD)
- Configuration and technical acceptance
Change management
- Project management
- Integration of security in projects
- Formalization of policies
- Service delivery management
IS governance
- Assistance to IT decision makers: CTO, CISO…
- Cyber security diagnosis
- Implementation of a management system for information security
- Risk analysis and mapping
Implementation and Monitoring of KPIs
Technical & Academic
- Academic training to manufacturer technology solutions
- Practical training with scenarios
- Provision of an expert in the field
Businesses
- Methodological assistance
- Operational feedback
Security
- ISO27001 Lead auditor, Lead implementor, ISO27005
- Android security
- WEB development security (OWASP)
- Staff awareness
THEY TRUST US
OUR CSR APPROACH
Transparency, ethics, initiative, and diversity are values rooted in the history of EVA Group.



